BTEC National in IT Organisational systems security - Software and network security (P3,M2,D1)

Authors Avatar by jamie9481gmailcom (student)

Software and network security

Handshaking: This is the process in which when a computer tries to establish a connection with another computer or device defines the rules for communication. Handshaking makes it possible for two computers or devices to connect without the need of human intervention to set parameters or rules of communication. Handshaking is the steps or verifying the connection, speed or authorization of the computer or device trying to connect to it.

Diskless networks: This is where the computer at the workstation doesn’t have any form of data storage and depends on another computer such as a server to load its operating system and to access data over a network connection. This is useful as it is easy to transfer data from a computer to a mobile storage device and removes the vulnerability of PC’s in the workstation. This can also be done over the ‘cloud’ using applications that emulate the behaviour of your computer system.

Use of backups: This is where data is copied to another storage device to ensure the data is safe and secure should system failures occur. These can help organizations recover from such failures and disasters immediately. There are several types of backups such as, incremental which stores only changed data since the last backup and differential which stores data that changed from the last full backup.

Join now!

Audit logs: This is where network and database activity is recorded, mainly who, what, and when the activity was performed. The purpose of this is to record how any system was used, on discovery of an issue to allow the possible cause to be tracked and to alert administrators to suspicious activity.

Firewall configurations: A firewall can be hardware or software. This is where traffic into and out of the computer system is controlled, allowing or disallowing traffic to enter or leave the network. This is done by the use of rules configured by the admin or user ...

This is a preview of the whole essay